Authentication in mobile devices through hand gesture recognition

This article proposes an innovative biometric technique based on the idea of authenticating a person on a mobile device by gesture recognition. To accomplish this aim, a user is prompted to be recognized by a gesture he/she performs moving his/her hand while holding a mobile device with an accelerometer embedded. As users are not able to repeat a gesture exactly in the air, an algorithm based on sequence alignment is developed to correct slight differences between repetitions of the same gesture. The robustness of this biometric technique has been studied within 2 different tests analyzing a database of 100 users with real falsifications. Equal Error Rates of 2.01 and 4.82% have been obtained in a zero-effort and an active impostor attack, respectively. A permanence evaluation is also presented from the analysis of the repetition of the gestures of 25 users in 10 sessions over a month. Furthermore, two different gesture databases have been developed: one made up of 100 genuine identifying 3-D hand gestures and 3 impostors trying to falsify each of them and another with 25 volunteers repeating their identifying 3-D hand gesture in 10 sessions over a month. These databases are the most extensive in published studies, to the best of our knowledge.

[1]  S. S. Chowhan,et al.  Iris Biometrics Recognition Application in Security Management , 2008 .

[2]  N. Ramaraj,et al.  Enhancing the Efficiency of Regression Testing through Intelligent Agents , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[3]  Christopher Verplaetse,et al.  Inertial Proprioceptive Devices: Self-Motion-Sensing Toys and Tools , 1996, IBM Syst. J..

[4]  Zhen Wang,et al.  uWave: Accelerometer-based Personalized Gesture Recognition and Its Applications , 2009, PerCom.

[5]  J. Little,et al.  Recognizing People by Their Gait: The Shape of Motion , 1998 .

[6]  Ryszard Tadeusiewicz,et al.  Voice as a Key , 2009, 2009 International Conference on Biometrics and Kansei Engineering.

[7]  Hong Chang,et al.  SVC2004: First International Signature Verification Competition , 2004, ICBA.

[8]  Tieniu Tan,et al.  Biometric personal identification based on handwriting , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.

[9]  Jani Mäntyjärvi,et al.  Accelerometer-based gesture control for a design environment , 2006, Personal and Ubiquitous Computing.

[10]  Gonzalo Bailador,et al.  A Real-Time In-Air Signature Biometric Technique Using a Mobile Device Embedding an Accelerometer , 2010, NDT.

[11]  C. Nandini,et al.  Multi - Biometrics Approach for Facial Recognition , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[12]  Josef Kittler,et al.  A Method for Estimating Authentication Performance over Time, with Applications to Face Biometrics , 2007, CIARP.

[13]  Steven Furnell,et al.  Authenticating mobile phone users using keystroke analysis , 2006, International Journal of Information Security.

[14]  Anil K. Jain,et al.  Biometric Systems: Technology, Design and Performance Evaluation , 2004 .

[15]  Jung-Shyr Wu,et al.  Integrating LCS and SVM for 3D handwriting recognition on handheld devices using accelerometers , 2009, ICC 2009.

[16]  Zhenyu He,et al.  Gesture recognition based on 3D accelerometer for cell phones interaction , 2008, APCCAS 2008 - 2008 IEEE Asia Pacific Conference on Circuits and Systems.

[17]  T.G. Palanivelu,et al.  Adaptive Route Timeout for On-Demand Routing Protocols in MANETs , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[18]  Kenichi Yamazaki,et al.  Gait analyzer based on a cell phone with a single three-axis accelerometer , 2006, Mobile HCI.

[19]  Durbin,et al.  Biological Sequence Analysis , 1998 .

[20]  Tapio Seppänen,et al.  Hand gesture recognition of a mobile device user , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).

[21]  David Zhang,et al.  Combining 2D and 3D hand geometry features for biometric verification , 2009, 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops.

[22]  Arun Ross,et al.  Handbook of Biometrics , 2007 .

[23]  Thian Song Ong,et al.  Integrating Palmprint and Fingerprint for Identity Verification , 2009, 2009 Third International Conference on Network and System Security.

[24]  Raymond N. J. Veldhuis,et al.  Biometric Authentication for a Mobile Personal Device , 2006 .

[25]  P. Jonathon Phillips,et al.  An Introduction to Evaluating Biometric Systems , 2000, Computer.

[26]  Paul Anderson,et al.  Gesture-recognition with Non-referenced Tracking , 2006, 3D User Interfaces (3DUI'06).

[27]  P. Suganthi,et al.  Mobile Phones Security Using Biometrics , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).

[28]  Webb Miller An Introduction to Bioinformatics Algorithms , 2006 .

[29]  R. Bellman Dynamic programming. , 1957, Science.

[30]  Einar Snekkenes,et al.  Arm Swing as a Weak Biometric for Unobtrusive User Authentication , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[31]  V. S. Nalwa Automatic on-line signature verification , 1997 .

[32]  Khalid Saeed,et al.  A Keystroke Dynamics Based System for User Identification , 2008, 2008 7th Computer Information Systems and Industrial Management Applications.

[33]  Sharath Pankanti,et al.  BIOMETRIC IDENTIFICATION , 2000 .

[34]  F. Okumura,et al.  A Study on Biometric Authentication based on Arm Sweep Action with Acceleration Sensor , 2006, 2006 International Symposium on Intelligent Signal Processing and Communications.

[35]  Shigeyuki Sakazawa,et al.  Arm Swing Identification Method with Template Update for Long Term Stability , 2007, ICB.

[36]  Anil K. Jain,et al.  On-line signature verification, , 2002, Pattern Recognit..

[37]  Azriel Rosenfeld,et al.  Local correspondence for detecting random forgeries , 1997, Proceedings of the Fourth International Conference on Document Analysis and Recognition.

[38]  Hirokazu Manabe,et al.  Security Evaluation of Biometrics Authentications for Cellular Phones , 2009, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[39]  Jani Mäntyjärvi,et al.  Enabling fast and effortless customisation in accelerometer based gesture interaction , 2004, MUM '04.

[40]  Yanggon Kim,et al.  Pupil and Iris Localization for Iris Recognition in Mobile Phones , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).